Updated—10/21/2024—The Verge reports that the Internet Archive is under the influence of attackers. Despite being back online in Read Only mode, it seems the attackers control the IA help desk. According to reports, the attackers have a Zendesk token and can intercept tickets.
—
Updated – 10/16/2024 – TechRadar reports that the attack used two attack vectors: TCP reset floods and HTTPS application layer attacks. The TCP flood will flood a victim with vast numbers of Transmission Control Protocol (TCP) reset packets, which trick a computer into terminating its connection with others in its network. An HTTPS application layer attack will typically aim to overwhelm servers by targeting the application layer to disrupt the normal traffic flow, rendering regular services unavailable.
—
The non-profit Internet Archive has been offline since Tuesday (10/09/2024). Founded in 1996, the Internet Archive digital library provides “universal access to all knowledge.” Through the Wayback Machine, it preserves billions of webpages, texts, audio recordings, videos, and software applications.
Internet Archive founder Brewster Kahle posted on X (formerly Twitter) that the site was under a DDoS attack.
Later on Tuesday, the attack evolved. The site started displaying a hacker pop-up notification. After closing the message, the site loaded typically but very slowly. The pop-up said:
“Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!”
HIBP refers to Have I Been Pwned?, a website where people can check to see if their information has leaked from cyber attacks.
Finally, the pop-up was gone, along with the rest of the site, leaving only a placeholder message saying:
“Internet Archive services are temporarily offline.”
Stolen Internet Archive data
On September 28, 2024, attackers stole the site’s user authentication database with 31 million unique records. Bleeping Computer confirmed that Have I Been Pwned had received an “ia_users.sql” database file containing authentication information for registered members, including their email addresses, screen names, password change timestamps, Bcrypt-hashed passwords, and other internal data.
Who is responsible
The hacktivist group SN_BlackMeta, which emerged in November 2023, claimed responsibility for the DDoS attack. Cybersecurity firm Radware connected SN_BlackMeta to a pro-Palestinian hacktivist movement that utilizes DDoS-for-hire services like InfraShutdown. SN_BlackMeta has launched other cyberattacks, including a record-breaking DDoS attack against a Middle Eastern financial institution.
It’s unclear if they are involved in the Internet Archive data breach. The group said that it carried out the DDoS attack because the United States supports Israel and that the Internet Archive “belongs to the USA.”
Many social media users quickly pointed out that the Internet Archive is an independent non-profit organization not affiliated with the U.S. government.
Internet Archive Back online – sorta
10/14/2024, it is back in a limited read-only way
rb-
Finally, what do you need to do if you have an account at the Internet Archive?
A compromised password is always a concern in any breach. But in this case, the passwords were salted and hashed, making them difficult to crack through reverse engineering or brute force. Still, once the Internet Archive returns, you should change your password to be safe.
Related article
Ralph Bach has been in I.T. for a while and has blogged from the Bach Seat about I.T., careers, and anything else that has caught my attention since 2005. You can follow me on Facebook or Mastodon. Email the Bach Seat here.